Thidot2

27 Questions | Attempts: 341
Please wait...
Question 1 / 28
🏆 Rank #--
Score 0/100

1. Post-test questionnaires (conducted after a usability test) are particularly useful for measuring?

Submit
Please wait...
About This Quiz
Algorithm Quizzes & Trivia

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Which of the following is the most appropriate as the description of code design and code management?

Submit

3. Software quality characteristics include reliability, usability, maintainability and portability. Which of the following explains reliability?

Submit

4.   Marks: 1 Officially, which port is used for SSH?

Submit

5. Which is the correct statement about the recent increase in macro viruses?

Submit

6. Which of the following operation methods is NOT appropriate for use with a computer system used with public telephone network?

Submit

7. Post-test questionnaires (conducted after a usability test) are particularly useful for measuring?

Submit

8. A method that does not require human participants serving as test users is the

Submit

9. If the heuristic function in an A* search algorithm is h( n) = 0, this A* search algorithm becomes which of the following algorithms?

Submit

10. Which of the following is an accurate statement concerning an ADSL?

Submit

11. Which of the following protocols has become a worldwide de facto standard? The protocol is used by the ARPANET in the USA, and is built into the UNIX system.

Submit

12. There is a transposition cryptosystem in which plain text is devided into four-character blocks and in each block, the first character is moved to the third, the second to the first, the third to the fourth, and the fourth to the second. In this system, which is the correct cipher text for the plain text "DEERDIDDREAMDEEP"?

Submit

13. What is the correct description of packet switching?

Submit

14. Which is the most appropriate practice for user ID management?

Submit

15. Valid reasons for usability testing are:

Submit

16. Which of the followig FOL sentences most matches the meaning of "Squares adjacent to wumpus are smelly"?

Submit

17. How many heuristic function are there for a given problem?

Submit

18. Which is in an inappropriate way of handling passwords and a password file in the system management department?

Submit

19. Which of the following software test methods is used to check whether modifications made for software maintenance have affected other portions or not?

Submit

20. What is the appropriate description of a router?

Submit

21. To use E-mail on the Internet, the two protocols SMTP and POP3 are used on mail servers. Which is the appropriate explanation of this?

Submit

22. Which of the following algorithms is NOT a local search algorithm?

Submit

23. Which of the following SQL statements can extract employee_name has whose salary is 300,000 or higher from the table human_resource?

Submit

24. N a heuristic evaluation:

Submit

25. Regarding relational database manipulation, which of the following statements correctly explains projection?

Submit

26. Which of the following does not belong to 9 heuristics?

Submit

27. Software quality characteristics include reliability, usability, maintainability and portability. Which of the following explains reliability?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (27)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Post-test questionnaires (conducted after a usability test) are...
Which of the following is the most appropriate as the description of...
Software quality characteristics include reliability, usability,...
 ...
Which is the correct statement about the recent increase in macro...
Which of the following operation methods is NOT appropriate for use...
Post-test questionnaires (conducted after a usability test) are...
A method that does not require human participants serving as test...
If the heuristic function in an A* search algorithm is h( n) = 0, this...
Which of the following is an accurate statement concerning an ADSL?
Which of the following protocols has become a worldwide de facto...
There is a transposition cryptosystem in which plain text is devided...
What is the correct description of packet switching?
Which is the most appropriate practice for user ID management?
Valid reasons for usability testing are:
Which of the followig FOL sentences most matches the meaning of...
How many heuristic function are there for a given problem?
Which is in an inappropriate way of handling passwords and a password...
Which of the following software test methods is used to check whether...
What is the appropriate description of a router?
To use E-mail on the Internet, the two protocols SMTP and POP3 are...
Which of the following algorithms is NOT a local search algorithm?
Which of the following SQL statements can extract employee_name has...
N a heuristic evaluation:
Regarding relational database manipulation, which of the following...
Which of the following does not belong to 9 heuristics?
Software quality characteristics include reliability, usability,...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!